Ukrainian ransomware gang behind high-profile attacks dismantled

Law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations. On 21 November, 30 properties were searched in the re… Continue reading Ukrainian ransomware gang behind high-profile attacks dismantled

Secret White House Warrantless Surveillance Program

There seems to be no end to warrantless surveillance:

According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected of any crime, including victims. Using a technique known as chain analysis, the program targets not only those in direct phone contact with a criminal suspect but anyone with whom those individuals have been in contact as well…

Continue reading Secret White House Warrantless Surveillance Program

The shifting sands of the war against cyber extortion

Ransomware and cyber extortion attacks aimed at organizations are not letting up. Occasionally, they even come in pairs. The often large and sometimes massive ransomware recovery costs companies incur when they decide not to meet the demands deter many… Continue reading The shifting sands of the war against cyber extortion

Smart riot gun refuses to fire if aimed at someone’s head

To reduce accidental deaths during civil disturbances, firearms manufacturer FN Herstal has developed a gun that not only fires less-than-lethal elastomer projectiles, it has a digital smart sight that can recognize human heads and refuse to fire at th… Continue reading Smart riot gun refuses to fire if aimed at someone’s head

Cost of a data breach: The evolving role of law enforcement

If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and […]

The post Cost of a data breach: The evolving role of law enforcement appeared first on Security Intelligence.

Continue reading Cost of a data breach: The evolving role of law enforcement

Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement

Finnish authorities have seized the drugs marketplace Piilopuoti, which has been operating on the Tor network since May 2022.
The post Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement appeared first on SecurityWeek.
Continue reading Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement

The Hacker Tool to Get Personal Data from Credit Bureaus

The new site 404 Media has a good article on how hackers are cheaply getting personal information from credit bureaus:

This is the result of a secret weapon criminals are selling access to online that appears to tap into an especially powerful set of data: the target’s credit header. This is personal information that the credit bureaus Experian, Equifax, and TransUnion have on most adults in America via their credit cards. Through a complex web of agreements and purchases, that data trickles down from the credit bureaus to other companies who offer it to debt collectors, insurance companies, and law enforcement…

Continue reading The Hacker Tool to Get Personal Data from Credit Bureaus

Balancing telecom security, law enforcement, and customer trust

In this Help Net Security interview, Mark O’Neill, CTO at BlackDice Cyber, talks about collaboration, transparent policies, and a security-first mindset. As 5G and IoT emerge, robust measures and AI will navigate challenges and shape the telecom indust… Continue reading Balancing telecom security, law enforcement, and customer trust

Backdoor in TETRA Police Radios

Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world.

The European Telecommunications Standards Institute (ETSI), an organization that standardizes technologies across the industry, first created TETRA in 1995. Since then, TETRA has been used in products, including radios, sold by Motorola, Airbus, and more. Crucially, TETRA is not open-source. Instead, it relies on what the researchers describe in their presentation slides as “secret, proprietary cryptography,” meaning it is typically difficult for outside experts to verify how secure the standard really is…

Continue reading Backdoor in TETRA Police Radios

New York Using AI to Detect Subway Fare Evasion

The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an “AI system” to detect people who don’t pay the subway fare.

Joana Flores, an MTA spokesperson, said the AI system doesn’t flag fare evaders to New York police, but she declined to comment on whether that policy could change. A police spokesperson declined to comment.

If we spent just one-tenth of the effort we spend prosecuting the poor on prosecuting the rich, it would be a very different world.

Continue reading New York Using AI to Detect Subway Fare Evasion